SUBMITTED IN PARTITAL FULFILLMENT OF MASTER OF COMPUTER APPLICATIONS MAHARSHI DAYANAND UNIVERSITY, ROHTAK BY SANGEETA SHARMA M.C.A VI SEMESTER ENROLLMENT NO. 510101486 ROLLNO. 322014 STUDY CENTRE CODE: 1025 SANGEETA SHARMA ROLL NO 322014 Submitted in partial fulfillment of the Requirement of TO MAHARSHI DAYANAND UNIVERSITY, ROHTAK PROJECT CARRIED AT NATIONAL INFORMATICS CENTRE CGO COMPLEX, LODHI ROAD NEW DELHI-110003 BY SANGEETA SHARMA ENROLLMENT NO.510101486 ROLL NO. 322014 UNDER THE SUPERVISION OF Mr. Mohd. Ashfaq Technical Director & Chief Security Officer National Informatics Centre CGO Complex, Lodhi Road New Delhi-110003 Resume Sangeeta Sharma C-85/16, GaliNo.8 Mohanpuri Maujpur, Delhi-110053 Contact No: 011-22917778, 9818352540 Email: Sangeeta_init@rediffmail.com OBJECTIVES Seeking a position that utilizes the strength of my knowledge and experience in computer field. PROFESSIONAL QUALIFICATION: P.G.D.C.A from C.C.S. University, Merrut with First Division. M.Sc (C.S) from Maharshi Dayanand University, Rohtak with First Division. Pursuing M.C.A. (6th) Semester from Maharshi Dayanand University, Rohtak. ACADEMICS QUALIFICATION: Passed B.A from C.C.S. University, Merrut in 2002 PROJECTS EXPERIENCE: Six months training at National Informatics Center, C.G.O Complex Lodhi Road, New Delhi-110003. PROJECTS UNDERTAKEN DURING TRAINING AT NIC AS PART OF M.C.A: Automation of Security Related package consists of nic telephone directory, laptop in/out monitoring, issue of car sticker & identity card issue. The Visual Basic 6.0 has been used as front end security developed Ms-Access was used as back end or server, which will be replaced by MS SQL on a server system once every application is in listed on client system under Ms-Access & any possible error is removed and made appraisal after removal of any possible error. 1. N.I.C TELEPHONE DIRECTORY: Description:- This application is developed to assist reception staff of National Informatics Center. Telephone directory system in NIC exists on intranet service, which especially meant for NIC employees only. The directory contains information up to certain level of officers and does not serve the purpose of reception. Security needs at reception a telephone directory that contains information about all NIC employees irrespective of their designation i.e. from Director General to a peon at lowest level. This application will not only serve as telephone directory but also provides address and place of posting as well. 2. LAPTOP IN/OUT MONITORING: Description:- This appliction is developed to monitor movement of laptops from NIC HQ. This application software provides a report to monitor the NIC laptops and gives information about a particular laptop whether the officer has brought back the same or not. Laptop information system also provides easy verification of any personal laptop being taken out on the basis of entry records. 3. ISSUE OF CARD STICKERS: Description:- This project keeps details of issue personal vehicle sticker’s details and government vehicle sticker details. The vehicle stickers are issue by CISF on the recommended office of CSO, NIC. They vehicle include car personal & govt, motor cycle, scooters etc. 4. IDENTITY CARD ISSUE AND MONITORING: Description:- In this project developed the different package:- MHA Identity Card Issue of identity card from NIC HQ for NIC employees. Issue of Temporary Pass for Externals Issue of MES Temporary Photo Pass PROJECT DURING M.Sc.(C.S.)Final Year: PROJECT NAME: VIDEO LIBRARY MANAGEMAENT SYSTEM Description:- This is a project about Video Library Management System of big or small cds library. In this project I am trying to organize whole work through the computerized system rather than manual performance. COMPUTER SKILLS: Programming Languages: - C#, C, C++, Java Web Server Application: - V.B.Net, ASP.Net GUI: - V.B. 6.0 RDBMS: - MS-Access, SQL 7.0,2000, ORACLE 8i,9i Networking: - LAN, WAN & MAN Scripting Language: - Java Script Markup Language: - HTML, DHTML, XML Methodologies: - SAD, S.E., OOAD, SQA, C.G. Application Package: - MS-Office OPERATING SYSTEM: - MS-Dos, Windows (95, 98, 2000, ME, XP), UNIX, Linux PERSONAL DETAILS:- Date of Birth February 8th, 1981 Martial Status Single Languages English & Hindi DATE: (Sangeeta Sharma) PLACE: CERTIFICATE This is certified that the dissertation entitled “AUTOMATION OF SECURITY RELATED ACTIVITIES” developed and submitted by “SANGEETA SHARMA” in partial fulfillment of the requirement of “MASTER OF COMPUTER APPLICATIONS” has been examined and for to be working satisfactorily. I wish her a best and bright future. Date: (Mohd. Ashfaq) Project Guide Technical Director National Informatics Centre CGO, Complex, Lodhi Road New Delhi-110003. CERTIFICATE It is to certify that the project work entitled “AUTOMATION OF SECURITY RELATED ACTIVITIES”, which is being submitted by me in partial fulfillment of the requirement for award of the degree of “MASTER OF COMPUTER APPLICATIONS (MCA) Sixth Semester or Diploma Name in the Directorate of Distance Education is an authentic work carried out by me at………………………… Under the supervision and guidance of …………………. The matter imbedded in this project work has not been submitted earlier for the award of any other degree or diploma. (Signature and Name of Supervisor) (Signature of Student) Name: Sangeeta Sharma Enroll. No: 510101486 Center Code: 1025 DATE: - PLACE: - (Signature & Name of Study Centre Head) ACKNOWLEDGEMENT The completion of the project entitled, “Automation of Security Related Activities” gives me an opportunity to convey my gratitude to all those who have helped me to complete this project successfully within time. I am much obliged to National Informatics Centre, New Delhi for giving me an opportunity and the congenial atmosphere to learn while working without bounds. I would like to express my gratitude to Mr. Mohd. Ashfaq, Technical Director, who provided me the facility for making this project. I gracefully acknowledge that in spite of his hectic schedule, devoted a lot a time with me. His kind cooperation and advised help me to concentrate on the project and to present it in this form. I would like to thank my internal guide Mr. Rajoo, Faculty in D.A.V.IT Centre, Tilak Nagar. Last but not the least; I am also thankful to my parents for their wishes and encouragement that lead me successfully through this project. Dated: (Sangeeta Sharma) SYNOPSIS Project Title Automation of Security Related Activities Developer’s Name Sangeeta Sharma Roll No. 322014 College Address D.A.V. IT Centre, Tilak Nagar Training Organization National Informatics Centre A-Block, CGO Complex New Delhi-110003 Synopsis Abstracts The project entitled “Automation of Security Related Activities” shares all the information about the drive in terms of properties and methods and also allows user to perform all operation on them. Security automation is as per the needs of the organization and in accordance with the current trends of the market. Duration M.C.A. 6th Semester Position Project trainee. System analysts and developed for the portion of package assign to me. Project Guide Mr. Rajoo Vasta (Internal) Project Guide Mr.Mohd Ashfaq (Tech. Dir.) (External) Development Platform Visual basic 6.0 (Front end), MS-Access (Back End) & Crystal Report ABOUT NATIONAL INFORMATICS CENTRE 1.1 Introduction National Informatics Center (NIC) is a premier Information Technology organization in India committed to providing state-of- the-art solutions for the IT needs of the Government of India at all levels. NIC carries the distinction of being the largest IT Organization in the Country and has set up a satellite based nationwide computer communication network called NICNET having over 1400 nodes connecting the National Capital, the State Capitals and the District Headquarters to one another. The IT services of NIC range from Consultancy, Software Design & Development, Office Automation and Networking Services to Training, Video Conferencing, CAD, EDI, Multimedia and Internet Services including Web Site Development and Hosting. NIC has a nationwide presence with its offices spread all across the Country, from Leh to Andaman & Nicobar Islands. NIC Headquarters is based in New Delhi. At NIC Headquarters, a large number of Application Divisions exist which provide total Informatics Support to the Ministries and Departments of the Central Government. NIC computer cells are located in almost all the Ministry Bhawans of the Central Government and Apex Offices including the Prime Minister’s Office, the Rashtrapati Bhawan and the Parliament House. Apart from this, NIC has various Resource Divisions at the Headquarters, which specialize into different areas of IT and facilitate the Application Divisions as well as other NIC Centers in providing state-of-the- art services to the Govt. 1.2 National Informatics Centre(History) The organizational set up of NIC encompasses its Headquarters at New Delhi, State Units in all the 28 State capitals and 7 Union Territory Headquarters and District centers in almost all the Districts of India. The Organization employs a large pool of efficient technical manpower. At the NIC Headquarters, a large number of Application Divisions exist which provide total Informatics Support to the Ministries and Departments of the Central Government. NIC computer cells are located in almost all the Ministry Bhawans of the Central Government and Apex Offices including the Prime Minister’s Office, the Rashtrapati Bhawan and the Parliament House. Apart from this, NIC has various Resource Divisions at the Headquarters, which specialize into different areas of IT and facilitate the Application Divisions as well as other NIC Centers in providing state-of-the-art services to the Govt. At the State level, NIC State Centers provide informatics support to their respective State Government and at the District level lay the NIC District Informatics Offices which strive hard to provide effective informatics support to the Development, Revenue and Judiciary administration of the District. In order to promote Information Technology in the country, focusing on INTERNET Technology based Value-added Services in the area of Industry, Business and Commerce, NIC has also established 17 National Information Technology Promotional Units (NITPUs) at major industrial/ Commercial cities viz.- Ahmedabad, Bangalore, Bhopal, Bhuwaneswar, Chandigarh, Chennai, Hyderabad, Jaipur, Kanpur, Kochi, Kolkata, Lucknow, Mumbai, Nagpur, Patna, Pune and Vishakapatnam. These centres provide Video-conferencing facilities, EDI services and other INTERNET Technology based Services over NICNET. Ever since its inception in 1977, NIC has been taking firm steps while moving towards its aim of being the pinnacle of IT in India. And the biggest leap in this direction was taken in 1988, when NIC’s satellite based computer communication network NICNET went into operation.1NICNET is one of the largest VSAT based networks of its kind in the Country. NICNET has over 1400 VSATs installed currently and is poised to grow to several thousands of VSATs in the next couple of years. There is no single VSAT that can meet the requirements of all sections of Users. Hence, NICNET has been upgraded to support a variety of VSATs namely CDMA, TDMA, FTDMA, SCPC, DAMA and Receive only VSATs. The network uses state-of-the-art technology in C-Band as well as KU_Band ranges. 1.3 Services The spectrum of services provided by NIC encompasses various dimensions of the Information Technology Arena and can be broadly listed as under: Consultancy Software Design & Development Networking Internet Services WWW Services Video Conferencing Computer Aided Design (CAD) Multimedia Geographical Information System (GIS) Electronic Commerce Office Automation Training Rural Informatics Bibliographic Informatics Computer Telephony Interface (CTI) Computer Aided Paperless Examination Systems (CAPES) Mathematical Modeling and Simulation National Information Technology Promotion Units (NITPUS) NIC has set-up NITPUs to provide Internet and other value-added services to the exporters with a view of promoting the export sector in the country. The NITPUs are located at 11 major export cities of the country connected through NICNET. The range of service provided by these units includes: Internet Connectivity E-mail Web Authoring and Hosting Video Conferencing 1.4 Facilities NICNET facilitate the following requirements of NIC in serving various government departments and associated organizations throughout the country. Monitoring of vital socio-economic projects. Online retrieval from database and updating. Optimum utilization of expensive computer resources. Emergency communication systems. Sharing latest software tools. Dissemination of information. Electronic mail facility. International remote access. Electronic Data Interchange (EDI). Internet access. 1.5 Principal Objectives of NIC Development of computerized information systems in various sectors of the economy are planning, project monitoring and decision support. Development of modeling, forecasting and simulation technique’s that is required for planning and decision support. Improvement of the analytical capability and presentation of information utilization are central, state and district level planning. Promotion of information culture at districts, state and national level. Establishment of a computer communication network are ensuring ready access of information across the nation and enabling optimal use of resources. Evolving standards all data collections, compilation and dissemination with the cooperation’s of related agencies at districts, state and central levels. Provide gateways for accessing international databases for those working districts, states and centrals level. The advent of Information Technology as a highly leveraged enabling tool for delivery of services in the public and the private sector has by now been universally recognized. This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in this context that the issued of Smart Governance- Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving Electronic Governance EG) goes far beyond mere computerization of stand alone back office operations. It means to fundamentally change as to how the Government operates and this implies a new set of responsibilities for the executive, legislature and citizenry. The effort should aim to bring about a social catharsis, which needs to be orchestrated in a comprehensive, concerted and planned fashion. NIC is the organization directly responsible for implementation E-Governance in various sectors. It is also educating people on E-Governance and helps to achieve it. NIC is also publishing Monthly Informatics magazine, which is an E-Governance product bulletin. This gives information about E-Governance product and services in addition to achievement, products services from NIC. ABOUT PROJECT 2.1 Introduction WHAT is Automation of Security Related Activities? Chief Security officer heads the security division. The applications have been developed as per his requirement. The Automation of Security Related Activities have been developed using Visual Basic 6.0 and Ms Access. Visual Basic 6.0 used as front end and Ms Access as back end. This system controlled the data entry regarding the transactions like entry of employee’s records, search, delete and modify on existing records, queries on these records, entry on laptop movement i.e. IN/OUT from NIC Externals and Internals Persons, NIC telephone directory, MHA Identity Card, Issued of Card Sticker for Government Vehicle and Personal Vehicle. Automation of Security Related Activities contains different modules:- Identity Card Issue and Monitoring 1. MHA identity card 2. Issued of identity card from NIC HQ for NIC employees 3. Issue of Temporary Photo Pass for Externals 4. Issue of MES Temporary Photo Pass Laptop IN/OUT Monitoring Issue of Card Stickers Telephone Directory of NIC employees More automation like computer equipments, Non-technical goods being taken IN/OUT from building, key (room key and locks) management and special permissions to people visiting NIC on holidays and nights ate to be taken up in future. Once the complete Automation of Security Related Activities package is ready, the database will be taken up to a server. Temporary identity cards are issued to the employees from other organizations, workers from contractors by NIC or C.P.W.D. for various services in NIC. The temporary card issued can have maximum validation period of six month. Non-photo passes will have validity one month. Ministry of home affairs identity cards are issued to NIC employees and MHA assist security Department to alert NIC employee in advance for renewal of their identity cards and avoid paid of penalty amount. This project is developed according to the above passage. This project will develop the computerized temporary pass for the trainee and other persons who come in NIC for the few months. And this project also maintains the database for the employees who want to MHA cards. This project also sends an automatically E-Mail to the employees whose cards are going to expire. Laptop information system helps security staff to have a check on movements of laptops, which are theft prone. Telephone directory system in NIC is available on intranet services, which especially meant for NIC employee’s only. The directory contains information up to certain level of officer and does not serve the purpose of the reception. Reception staff wanted a telephone directory, which contains information about all NIC employees irrespective of their designation i.e. from D.G u to lowest level i.e. messenger and safai-wala. This directory not only serves as telephone directory also provides address and place of posting as well. 2.2 Name of the Project AUTOMATION OF SECURITY RELATED ACTIVITIES 2.3 Project Leader The project is being analyzed and overviewed by a highly qualified, efficient project leader. He is working in NIC since December 1978 and has been involved in development of various applications software. He is responsible for the maintenance of CAD/CAM software from 1984 to 1996. He was also looking the operational maintenance activity of host computer, the cyber 730 and cyber 830. Currently he is working as technical director. He is first technical person who is working as CSO. That is why computerization of security division is taken up which was not done so far in organization like NIC. Name: Mr. MOHD. ASHFAQ Designation: TECHNICAL DIRECTOR, NIC 2.4 IDENTIFICATION AND PROBLEM DEFINITION To remove the problems in manually handling data, reports, this system is to be implemented regarding the trends in computerized facilities. This computerized system can overcome the different problems, which are faced in manual transaction. This development is based in GUI and hence user friendly, which allow even a person having little knowledge about computers to operate the package with ecase controlling execution through menus. Automation of Security Related Activities In the solution of problems with existing system is developed by using Visual Basic as front-end, Ms-Access as back-end and in the Windows XP on a PIV system. 2.5 MODULES OF PROJECT Starting Module Login Module Telephone Directory of NIC Employees Laptop IN/OUT Monitoring Issue of Card Stickers Identity card issue and Monitoring 1. MHA identity card 2. Issue of identity card from NIC HQ for NIC employees 3. Issue of Temporary Photo Pass for External and Personals 4. Issue of MES Temporary Photo Pass 2.6 OVERVIEW OF MODULE Laptop Information System Now a day Laptops have become an essential part of employee’s life working in various sectors. It is being carried by employees to provide held as an assistant. NIC being a technical organization that too in computer field and visited by many visitors’ with laptops everyday. Laptops are small and theft prone. Therefore, monitoring of Laptop’s IN/OUT is essential. The Laptop are also being taken OUT or brought IN by NIC employees. This laptop may be the property of NIC. This application software provides a report to monitor the NIC laptops and give information about a particular laptop whether the same has been brought back by the officer. This information system also provide easy verification of any personal laptop being taken out on the basis of record already in the system, through it s.no, make, model. This verification normally takes too much time in manual system especially where laptop’s exact date of bringing-in is not known or there is too much difference between IN/OUT dates. This process takes seconds in verifications just by entering s.no. being IN/OUT. NIC laptops may not be taken our without proper gate-pass. The same is true for personal laptops if not taken out on the same day. NIC Telephone Directory This directory has been developed to assist reception staff. This directory not only provides telephone number of any employee in NIC but also their address and place of posting. In case any visitor approaches reception and wishes to visit any employees of NIC, reception staff can find out the address, telephone number, place of posting etc. in seconds. In case the employees doesn’t sit in A-Block, CGO Complex, New Delhi-110003, the reception staff will guide the visitor on the basis of employees place of posting which may be any ministry/department outside CGO Complex. Issue of Car Stickers This application keeps details of issue personal vehicle and government vehicle sticker detail. The vehicle stickers are issue by CISF on the recommended officer of CSO & NIC. They vehicle include car personal and government, motor cycle, scooters etc. The application is maintain records of all issued vehicle sticker to NIC, with date of issue for easy tracking. MHA Identity Form MHA identity cards which are issued from Ministry of Home Affairs through NIC employees are covered under MHA identity cards. These cards are issued to government employees on the basis of government recommendation by authorized signature. In NIC responsibility the recommendation of with Mohd. Ashfaq, Technical Director for who is a head security division. These applications along with list of MHA for preparation of identity card. MHA is forward recognized application and raise objection if any and return backs such application. MHA identity cards are prepared for all other applicant where no objections are found. On receipt of application with objection necessary action taken by security section NIC to remove the objection and forward again to MHA for preparation of the identity card. All receipt of identity card individual is informed to collect the some from security section. In this passes record is maintained, which gives information on the forwarding of application and receipt of identity card. This application with little legal modification in documentation it is following the above process the automated process will allow security section to timely to inmate for collection of cards, expire of the cards in their position, any other query the basis of employees, date of issue, date of expire etc. Often employees who forget the renew card in time to penalizes. The advance animation on the basis of the information generated by this application will avoid penalties for late renewal. The applicant form is used to maintain the database of the applicant who comes for issuing the MHA I-Card. Ministry of home affairs identity cards are issued to NIC employees and MHA assist security department to alert NIC employees in advance for renewal of their identity cards and avoid cards and avoid paid of penalty amount. In this form we have also used crystal report to print reports. Temporary Pass for External Temporary Pass form is used to maintain the database of the persons who comes in NIC for some period of month. This form is also used to generate the temporary pass to the person. Temporary identity cards are issued to the employees from other organizations, workers from contractors by NIC for various services in NIC. We have used crystal report which is used to print the temporary pass and reports. Issue of MES Temporary Photo Pass MES temporary pass is nothing but a temporary pass valid for MES also. The MES temporary pass and temporary pass already discussed are produced by the same application. The procedure is same for both. In case of MES temporary photo pass, MES is clearly mentioned in bold letters to indicate that it’s valid for MES. MES passes are also valid for other NIC premises. Issue of identity card from NIC HQ for NIC employees All eligible employees of NIC posted in Delhi are issued identity card by MHA. NIC employees posted in states get their identity card issued by state governments. At some places NIC state unit is issuing identity card for employees posted in distt and tahsil. Any NIC employees not having identity card issued by local authorities applies for identity card at NIC HQ, where the identity card is issued by chief security officer of NIC. This application/software also allows security section NIC to print identity cards in addition to other entry and monitoring functions like in MHA identity card application. Splash Form This form is the staring form of the Project and contains information about the "Automation of Security Related Activities”. Login Form This function identifies a user through password and allows access of the computer facilities. Further, the user can only execute command depending upon the privileges defined in the system. Master Detail Form Master details form is used to maintain the database of the employees that is further used in Applicant and record forms to match or pick the data. 2.7 BENEFIT OF AUTOMATION OF SECURITY RELATED ACTIVITIES The Automation of Security Related Activities is user friendly and reliable. It provides GUI to the user that in turn provides simplicity to the user. This system overcomes the entire problems that are raised in manual transaction. 2.8 NEED FOR THE SYSTEM DEVELOPMENT WHY WE NEED THIS AUTOMATION OF SECURITY REALATED ACTIVITIES:- Due to various problems in existing manual system as explained below: - Inability of modification of data: The managing of huge data effectively and efficiently for efficient results, storing the details of the equipment etc. in such a way that the database can be modified as not possible in the manual system. Avoid redundancy and maintain consistency. Not user friendly: Any manual system normally is not user friendly because the retrieval and storing of data is slow and data is not maintained efficiently. Difficulty in reports generation: Either no report is generated in a manual system or they are generated with great difficulty. Reports take time to generate in the manual system. At times reports became useless by the time they are produced and the decision if any had already been taken on the assumption. Manual operator control: Manual intervention is there and leads to a lot of chaos and errors. Lot of paper work: Existing system requires lot of paper work and even a small transaction require many papers fill. Moreover any unnatural cause (such as fire in the organization) can destroy all data of the organization. Some times few pages may led to difficult situation. No support in strategic competitive advantage: Manual systems, as already discuss earlier takes two much time. The accuracy may be doubtful. The company which takes policy decision on assumption which is a common practice in the absence of computerized system or more likely to fail and loose against competitor in 21st century 2.9 CHARACTERISTICS OF THE PROPOSED SYSTEM Easiness in modification of data: The proposed system provides managing of huge data effectively and efficiently for efficient results, storing the details of the equipment, causes etc. in such a way that the database can be modified. Reports are easily generated: Reports can be easily generated in a proposed system. So any type of reports can be generated in a proposed system which helps the managers in a decision-making activity. No or very few paper work: The proposed system either does not require paper work or very few paper works is required. All the data is fed into the computer immediately and various reports can be generated through computers. Support strategic competitive advantage: Existing system support strategic competitive advantages. Since the proposed systems provide easiness in reports generating it will provide strategic advantages among competitors. DECLARATION I hereby declare that this “Automation of Security Related Activities” has been genuinely furnished by me. This is a maiden concept on whish no one has worked previously. Signature: OBJECTIVES A software Package is collection of different programs that are used to achieve a predefined goal or objectives. In most cases a manual system that is use has to be automated on the same lines so as to provide a more efficient outcome. There are various benefits of using an automated computerized system as compared to a manual system. It is efficient, accurate and less time consuming. Timely availability of analytical reports for decision-making and helps in better planning. Same report may be generated again and again and it will have no difference. To develop a software system it is very essential to completely understand the working and all the different aspects of the opportunity present for the new system and various directives for the system. We need a through understanding of the existing system. For an efficient development of the system we need to follow a life cycle known as system development life cycle. The life cycle steps are: - 1. Need for system development 2. Analysis 3. Design 4. Code 5. Acceptance 6. Maintenance. These steps provide a great help for the developer life cycle can be defined as a process by which system development life cycle can be defined as a process by which systems analysts; software engineers and programmers build system. It is a project management tool, used to plan, execute and control system development projects. To understand the current requirement and the supporting applications and data management. ANALYSIS 3.1 OVERVIEW OF ANALYSIS Analysis is the heart of the process. It is a key component of the first two phase of cycle. In phase one, we focused on the problem definition and initial investigation, where analysis helps and determining potential solutions. The outcome is system specifications that initiate the system design. The analysis part has to be done carefully because specifications are difficult to maintain or modify. A simple change in user requirements necessitates changes in several part of the document. During analysis phase of the project and my friend and faculty of the PCTI also help me to made project and prepared report in accordance, which we termed the life cycle of our project. 3.2 THE ANALYSIS HAS THE FOLLOWING ATTRIBUTE: It is graphic. The DFD for example presents a picture of what is being specified and is conceptually easy to understand of the specification. It calls for a rigorous study a commitment that is often taken lightly approach to the system analysis. The process is partitioned so that we have a clear picture of the progression from general to specific in system flow. It is logical rather than physical in nature. The elements not depend on vendor or hardware. This specifies in precise, concise and highly readable manner the working of the system and how it hangs together. 3.3 FEASIBILTY ANALYSIS DURING FEASIBILTY ANALYSIS WE INSPECTED THE TECHNICAL FEASIBILTY ECONOMICAL FEASIBILTY OPERATIONAL FEASIBILTY Which we found ok for the development of the software 3.4 DESIGN PHASE During design phase we made its data flow diagram of the s/w, which will be predicted later. 3.5 S/W DEVELOPMENT PHASE During this s/w phase we development our s/w using one of the most powerful tool visual basic. 3.6 TESTING PHASE During testing phase we prepare the dummy data and found ok from us, then this test was follows by live data from the end user. SYSTEM DESIGN 4.1 Design Overview Design is the phase where quality is forecasting in software development. Design provides with representative of software that can be accessed for quality. Design is the only way that we can accurately accessed for quality. During design we make decisions that will ultimately affect the success of software construction. And as important, the ease with which software can be maintained. Design is the only way that can accurately translate a customer’s requirement into a finished system or product. Software design serves as the foundation of all steps of software engineering and maintenance that follows. Without design, we risk building an unusable system, one that fail when small changes are made or one that may be difficult to test. Three characteristics that serve as a guide for the evaluation of good design: - The design must implement the entire explicit requirement in the analysis model and it must accommodate the entire implicit requirement desired by the customer. The design must be readable and understandable guide for those who test code and subsequently maintain the software. The design should provide a complete picture of the software, addressing the data functional and behavioral domains from an implement perspective. 4.2 DESIGN PRINCIPLES Software design is both a process and a model. The design process is set of iterative steps that enable the designer to describe all aspects software to be built. Basic design principle includes: - The design process should not suffer from tunnel vision. The design should not be traceable to the analysis model. The design should exhibit uniformity and integration. The design should be structured to accommodate change. The design should be reviewed to minimize conceptual errors. The design should be addressed or quality as it being created. 4.3 DESIGN CONCEPTS Design concepts provide the software designer with a foundation from which more sophisticated design can be applied. Program Structure or Software architecture. During detailed design the data structure and the algorithms used by different modules are designed. The outcome of detailed is usually known as the Module Specification Document. 4.4 QUALITIES OF GOOD SYSTEM DESIGN:- A good design should capture all the functionalities of the system correctly. It should be easily understandable. It should be efficient so that every member of the client side as well as the end user should feel comfortable about is\t. It should be easily amenable to change, i.e. easily maintainable. A good design is also easy to maintain and change. Unless a design is easily understandable, it would require a tremendous effort to maintain it. In order to enhance the understandability of a design, it should have the following features. Use of consistent and meaningful names for various design components. Use of a cleanly decomposed set of modules. Neat arrangement of modules in a hierarchy i.e. tree-like diagram. 4.5 Input Design Input design is a part of overall system design, which requires any careful attention. Often the collection of input data is most expensive part of the system. In term of both the equipment’s used and the number of people involved, it is the most contact point for the user with the computer system. And it is prone to error. If data going into the system is incorrect, then the processing and output will magnify these errors. Thus the designer has a number of clear objectives in input design. Considering the output requirements, to capture the necessary input data in most efficient way was designed. The input design has been done keeping in view that, the interaction of the user with the system is simple yet effective. The following points were considered during input design. Controlling amount of input Avoiding delay Avoiding error in data Eliminating extra spaces Keeping the process simple Size, color and arrangement of the forms Based on above-mentioned the input forms and screen of were designed. 4.6 SCREEN DESIGN (OUTPUT DESIGN) All the screens of the Automation of Security Related Activities are developed with view to provide the user with easy operation in a simple and efficient way with minimum possible keystrokes. Instruction and important message re flashed on the screen. Almost every screen is provided with option selection facilities. Much emphasis is given on speedy processing and speedy translation between the screens. Each screen is designed to make it as much user friendly as possible. So to say the user can operate the system without going through `operating manual `/` user operational manual`. The Performa for colleting data has been designed by taking in consideration all possible types of data needed by the user. All the necessary input forms were designed. 4.7 SYSTEM DESIGN FOR AUTOMATION OF SECURITY RELATED ACTIVITIES: In our project we classified our design in two steps. First we have design master forms in every module by which a user can get information about the module i.e. what are the task can be performed. Next we designed other form that performs the desire task depending on the task for it is designed. Another screen that we had designed is the Automation of Security Related Activities screen. In which end user will fill the appropriate information of the employee .Our System design follow the forms laid by the software design techniques. Firstly preliminary design had been design then detailed design when Automation of Security Related Activities screen had been developed. Firstly we are following software engineering paradigm. So first of all we have done requirement and specification phase and then we have applied designing phase that is the one of the most important part of our project. 4.8 SYSTEM SECURITY In this we have not emphasized on system security completely as we have told to do so. It us a departmental project therefore easy access was the main concern and not the too much security. Despite this security features are there in the system which can be invoked as and when required. Security against unintentional deletion has been provided in the system. We have given login id for admin and for user and their respective password. But in terms of systems security instruction of project guide had been followed, which will be upgraded in future development. After porting data on to Ms SQL after the completion Security package, access permissions will be decided as supported by MS SQL. Following points is to follow in terms of System Security: - No complex Structure. Reliable and Secure Database. Restrictions should be less. Options regarding system security should be mandatory. HARDWARE AND SOFTWARE REQURIMENTS SOFTWARE: - FRONT END: - VISUAL BASIC 6.0 For this Project, we are using Visual Basic as a Front-End. OPERATING SYSTEM USED: - WINDOW XP POFESSIONAL DATABASES: - MICROSOFT ACCESS For this project, we are using Microsoft Access as a Back-End. Here all the data will be saved. INTERFACE: - For the connectivity between these two things we will be using ODBC. HARDWARE: - PROCESSOR: - COMPUTER PENTIUM IV (933 MHZ) MEMORY: - 128 MB HARD DISK: - 4 GB RAM: - 128 MB MONITOR: - COLOR SCOPE OF THE PROJECT 5.1 Scope of Automation of Security Related Activities:- The system could be a completed pool of information could be limitless. The following improvements could be made in future to the system: The system is presently developed for internal use for NIC. Future vision is to develop it for additional security features. The system could be made more interactive on receiving the feedback provided by The user from time to time. More reports can be generated as per need. 5.2 Features of the system:- As already mentioned, the system is GUI-based, so it is easy for the user to interact with program. The system generates various information about coverage of establish and the user can make the desired query as and when required. This makes system worthwhile. The main highlights of the system are: System is User Friendly:- System provides the user-friendly screens for information retrieval. System is fully Menu Driven and easy to use:- The system is totally menu driven. The user can select any of the activity just by a click of a key. The software operation is very easy, requiring minimal training in computer. Easy to Use:- The system is very easy to use even a novice person who don’t have any knowledge about computer can user it. Easy to Maintain: - Since the application is loaded only at one machine, the newer version can be released easily since only the code at the one machine needs to be changed. PREPARATION OF TEST DATA Both types of data, Level Test Data and Artificial Test Data were used to ensure the correctness of the system. 6.1 Using Live Test Data: - The Live Test Data was actually extracted from the organization files. After the development of the entire master screen programs, the users of the system were asked to key in the set of data from their normal activities. This was mainly done with the intention of testing the system for finding errors after the partial development of the system and also to see how comfortable the user was with system. It is very difficult to obtain live data in sufficient amounts to conduct extensive testing. Although its realistic data the shows how the system would perform for the typical processing requirements, assuming that the live data entered is in fact typical, such data does not test all the combinations or formats that enter the system. The bias towards typical values does not provide a true system test and in fact ignores all the cases most likely to cause system failure. So Artificial Test Data was effectively used for test purposes. 6.2 Using Artificial Test Data Artificial Test Data was used to test all the combinations of formats and values. It was designed keeping in mind the intention that it should make possible the testing of all the logic and control paths through the program. Also the user of the system helped in preparing the artificial test data. The Artificial Test Data was prepared based on the following Validations: - Range Checks: - Data was chosen in such a way that there were values within the range and values at the boundaries. Field Size Checks: - Data was chosen in such a way that there were values exceeding the maximum width of the field. Key Fields: - Data was chosen so that the Primary key and foreign key constraints would be violated. Data Type Checks: - Data was chosen in such a way that it would be not match with the data types. Rules Checks: - Data types chose in such a way that the system specific business rules were satisfied. 6.3 UNIT TESTING In the unit testing all the units in the system are in the system are independently tested. This is important as the user comes to know about each and every single unit of the system completely. This testing is done during the programming stage. Each and every program in each and every unit is tested thoroughly. All the units in the systems like master form, import form, identity card detail form, vehicle sticker form; telephone directory form, laptop in/out from etc. are test independently. The logical errors in the code are also checked. The entire program is then complied using raw data. 6.4 SYSTEM TESTING In system testing the entire after sales system is again thoroughly tested. All the forms are fully tested and checked. It is also if the entire system has given the expected result. All the code and reports are checked for satisfactory and expected results. Thus all these types of the system are done to see whether after system is given the desired results. REQUIRMENT ANALYSIS 7.1 Overview Analysis is the heart of the process. It is a key component of the first two phases of cycle. In phase one, we focused on the problem definition and initial investigation, where analysis helps and determining potential solutions. The outcome is system specifications that initiate the system design. The analysis part has to be done carefully because specifications are difficult to maintain or modify. A simple change in user requirements necessitates changes in several part of the document. The Analysis has the following attribute It is graphic. The DFD for example presents a picture of what is being specified and is conceptually easy to understand of the specification. The process is partitioned so that we have a clear picture of the progression from general to specific in system flow. It is logical rather than physical in nature. The elements of a system do not depend on vendor or hardware. This specifies in precise, concise and highly readable manner the working of the system and how it hangs together. It calls for a rigorous study a commitment that is often taken lightly in approach to the system analysis. 7.2 Software Requirement Analysis:- As he project being developed is concerned about the “Automation of Security Related Activities”, a dedicated effort was made to gather the information required for the development of the same. Consulted the following departments:- 1. Security Division of NIC. 2. Technical Division of NIC. Gathered a quite deal of information from the above divisions regarding the following procedures: Employee’s I-Cards Details M.H.A. I-Cards Details N.I.C. I-Cards Details Consulted colleagues and several websites regarding sample projects in order to get the exact requirements for the development IMPLEMENTATION 8.1 Implementation Implementation is a process that includes all hose activity that to convert an existing system (manual or existing) to new system. There are three type of implementation. This is the most important phase of system Development Life Cycle where the actual implementation of designed system occurs. First phase is the implementation of a computer system to replace a manual system, the problem encountered are converting files, training users, creating accurate files and verifying printouts for integrity. Second phase is implementation of a new computer system to replace an existing system. This is usually a difficult conversion. If not properly planned, there can be many problems. Some large computer system has as long as a year to convert. Third phase is when modified application is developed to replace an existing system using the same computer. This type of conversions is comparatively easy to handle provided there are no major change in the files. In case of our system it was implementation of a computer system to replace an existing manual system. A through study of manual system was conducted for the successful implementation of the new system. The difficulties encountered are changing files from manual to computer based to store the database and ensuring that files created are correct. And verifying the results provided by the system to ensure consistent results. Proper implementation procedures were followed to give a reliable and more importantly a satisfying system. Inventory Control System totally related to file system of computer, since the query demanded by the user is fulfilled using these files. This project is divided into small modules so that each query can be satisfied quickly, accurately and so that other programmer can reuse modules. Modules were then integrating to from the complete system. Since each module was having different functions to perform like one module works to find out detailed information of a particular case, other works to give the information about, how the user logs into project by giving the valid user name and password etc. debugging becomes easy. During the implementation the problem that encountered are whether to use SQL or MS Access to maintain the database. Decision was made to use MS Access at client level and Oracle at server level. An important factor during implementation is giving to users. This is lightly necessary to minimize their resistance to change. Since the system is very user friendly and the users are provided with different options at every stage, so no need for specific was felt. 8.2 MAINTENANCE Maintenance includes the modification of existing applications to correct errors and bugs, improve the performance or even adapt to a changed environment. The service can be extended to include change requests from clients dealing with enhancements and refinements. As part of the services the responsibility is keeping applications reliable and available on a continuous basis. This eases the key challenge of running existing applications, providing code maintenance and performance management. The maintenance model used for this service consists of the following phases and activities: AUTOMATION OF SECURITY RELATED ACTIVITITES 1.0 MASTER 2.0 FILE 3.0 OPERATOR 4.0 HELP 1.1 EMPLOYEES 2.1 IMPORT 3.1 LOGIN 4.1 ABOUT RECORD FORM 2.1.2 EMPLOYEE MASTER 1.2 STATE RECORDS 4.2 2.1.3 TELEPHONE & CONTENT ADDRESS 2.2 IDENTITY CARDS 1.3 DESIGNATION 4.3 TITLE RECORDS 2.2.1 MHA CARDS 2.2.2 NIC CARDS 2.2.3. TEMPORARY CARDS 2.3 VEHICLE STICKERS LOGIC DIAGRAM START LOGIN FORM CONTENT PASSWORD HELP ABOUT WELCOME WINDOW EXIT TITLE MHA & LAPTOP CAR TELEPHONE ISSUE MONITORING STICKERS DIRECTORY TEMPORARY CARDS PASS SAVE RECORDS SAVE IN/OUT SAVE IMPORT SAVE RECORDS RECORDS DATA RECORDS DISPLAY RECORDS DISPLAY RECORDS DISPLAY DISPLAY SAVE RECORDS RECORDS RECORDS DELETE RECORDS ISSUE DELETE DELETE PERSONAL & RECORDS RECORDS REPORTS & GOVERNMEN VIEW REPORTS & T STICKERS VIEW VIEW & DELETE REPORTS REPORT REPORTS CLOSE DATA STRUCTURE DATA STRUCTURE: - MHA Identity Card DESCRIPTION: - This data structure will describe all the information about employee details and card details. Employee Code+ Employee Name Designation State of Posting Card Serial No.+ Valid up to+ Date Received from mha Date of issue+ Card Status Date of Application Date of Forward Reason issue DATA STRUCTURE: - Issue of identity card from NIC HQ for NIC employees DESCRIPTION: - This data structure will describe all the information about issue of identity card from nic HQ for nic employees. Employee Code+ Employee Name Designation State of Posting Card Serial No.+ Valid up to+ Date Received from mha Date of issue+ Card Status Date of Application Reason issue DATA STRUCTURE: - Temporary Pass DESCRIPTION: - This data structure will describe all the information about temporary pass. Applicant Index+ Name Date of Birth Designation Employee/Institute Valid up to+ Date of issue+ Card Serial No+ Card Status+ Reason issue Mes/A Block DATA STRUCTURE: - Laptop In/Out Monitoring DESCRIPTION: - This data structure will describe all the information about brings the Laptop Nic & External person. Employee Code+ Employee Name Designation+ State of Posting Auto Index Laptop No.+ In-date+ Out-date+ In-time+ Out-time+ Person index+ Name Organization Person serial Gate Pass No. DATA ELEMENT DICTIONARY DATA DESCRIPTION DATA WIDTH KEY RANGE ELEMENT TYPE OF NAME VALUES Employee Code Emp Code Text 5 Pk 1-999,A-Z Employee Name Emp name Text 25 A-Z Designation Designation Text 25 A-Z State of Posting State Posting Text 25 Pk 1-999,A-Z Card Serial No Card_Srno Text 6 1-999,A-Z Date of issue Date Issuing Date 10 1-9999 Date Application Date Application Date 10 1-9999 Date Forward Date forward Date 10 1-999 Card Status Card status Text 5 1-999,A-Z Valid Up to Vaild_up to Date 10 1-9999 Customer No Customer no Text 6 Pk 1-999,A-Z Laptop No Laptop No Text 25 1-999,A-Z In Date In Date Date 10 1-999 Out Date Out Date Date 10 1-999 In Time In Time Date 10 1-999 Out Time Out Time Date 10 1-999 Person Index Person Index Text 6 PK 1-999,A-Z Accessories No Accessories No Text 10 1-999,A-Z Gate pass no Gate Pass No Text 10 1-999,A-Z Vehicle Reg No. Veh_reg_no Text 6 1-999,A-Z Vehicle Type Veh_type Text 25 1-999,A-Z Relation Owner Rel_with_Owner Text 10 1-9999, A-Z Owner Owner Text 10 1-999,A-Z This form has details of the programmer. The form has a load button and unload button. When we click the load button it shows the login form. When we click the unload button the project is closed. This form is a login form. This form has a username and password. This form has a two- button ok and cancels. When we click on the ok button, it shows the title form. On clicking the cancel button close the login form, but show the main form. If the programmer takes a wrong password, the project not activated. This form is a title form. It has one button. On clicking this button then start the mdi form. This form has a system information and warning. System information is very useful for the programmer. This form has two button ok and system information. When we click the system information button, it shows the information of the system. On clicking the ok button to close the form. USER MANUAL To start the system either click on the shortcut Automation of Security Related Activities on the desktop or start it from the startup menu. When the system is started, the logon screen appears and then enters the following: - Username-> security, password-> security On entering the correct user name and password, the menu can be seen. The menu has the following components: - 1. Master Records 2. Issue Records 3. Login Form 4. View & Reports 5. About Master Records: - Employee Master Telephone & Address Identity Cards MHA Identity Card NIC Identity Card Temporary Pass Vehicle Stickers Login Form EXIT: - Allows we to exit the program and takes we to desktop. REPORT GENERATION Not Ready Card Ready For Issue Issued Card Expiring Next Month Notice about Expired Card Backup File External Report Not Ready Sticker Ready For Issue Issued Stickers Government Vehicle Private Vehicle List of Stickers in Backup BUTTONS USED IN THE INPUT SCREENS LAPTOP COMMAND BUTTON OUT This command button is used enter information like s.no, designation, laptop no, laptop s.no, date of out, time out that goes out from NIC. IN This command button is used to enter IN entry of laptop. SAVE This command button is used to save a particular record. PRINT This command button is used to print the report. Note: This entire command button has same function in every form. TELEPHONE COMMAND BUTTONS ADD Used to add a new record in the database. SEARCH This command button is used to enter IN entry of laptop. SAVE This command button is used to save a particular record. PRINT This command button is used to print the report. DELETE Used to delete an existing record in the database. CLOSE Used to close button the program Note: This entire command button has same function in every form. MHA COMMAND BUTTONS ADD Used to add a new record in the database. SEARCH This command button is used to enter IN entry of laptop. SAVE This command button is used to save a particular record. PRINT This command button is used to print the report. DELETE Used to delete an existing record in the database. DISPLAY Used to display record. CLOSE This is used to close the form Note: This entire command button has same function in every form. CARSTICKER COMMAND BUTTONS ADD Used to add a new record in the database. SEARCH This command button is used to enter IN entry of laptop. SAVE This command button is used to save a particular record. PRINT This command button is used to print the report. DELETE Used to delete an existing record in the database. DISPLAY Used to display record. CLOSE This is used to close the form. Note: This entire command button has same function in every form. USER ACCEPTANCE TEST AND CERTIFICATION The user acceptance was sought while designing and developing the system. The user of the system was already consulted from time during the software development process. After carefully completing the Analysis Phase of the software development process, the user acceptance was taken for the design phase and then table layouts were drawn. The inputs were carefully with user requirements in mind, the working prototype of the system was developed and the users feed back were taken view. After careful completion of each module, module testing was done in parallel. After successful completion of the testing phase, the user was again consulted the system was implemented to the complete satisfaction of the user. MHA IDENTITY CARD EMPLOYEE MASTER emp_code emp_name designation state_posting E001 Pooja Verma Tech. Director Delhi E002 Deepak Programmer New Delhi E003 Deepak Singh Tech. Asst. New Delhi CURRENT MHA CARD FILE emp_code card_srno valid_upto date_rec_mha date_issue card_status E001 MHA01 12/31/2005 11/30/2005 12/12/2005 Ready E002 MHA02 1/23/2006 1/23/2006 1/23/2006 Ready E003 MHA03 1/23/2006 1/23/2006 2/11/2006 Ready HISTORY CARD FILE emp_code card_srno valid_upto date_issue card_status date_returned E001 MHA01 12/31/2005 12/12/2005 Issued 9/12/2005 E002 MHA02 1/23/2006 1/23/2006 Issued 1/23/2006 E003 MHA03 1/23/2006 2/11/2006 Issued 2/11/2006 APPLICATION FILE emp_code date_application reason_issue date_forward app_status E001 2/9/2006 Lost 2/9/2006 Self Submit E002 2/9/2006 Lost 2/9/2006 Self Submit E003 2/11/2006 Returned 2/11/2006 Nic ISSUE OF IDENTITY CARD FROM NIC HQ FOR NIC EMPLOYEES EMPLOYEE MASTER emp_code emp_name designation state_posting E001 Pooja Verma Tech. Director Delhi E002 Deepak Programmer New Delhi E003 Deepak Singh Tech. Asst. New Delhi NIC CARD APPLICATION emp_code date_app reason_issue app_status E001 8/31/2005 Lost Printed E002 8/31/2005 Returned Printed E003 1/23/2006 Transfer Printed CURRNET NIC CARD FILE emp_code card_srno valid_upto date_issue card_status E001 C001 3/12/2006 9/2/2005 Returned E002 C002 3/12/2006 9/3/2005 Returned HISTORY CARD NIC emp_code card_srno valid_upto date_issue card_status date_return E001 C001 3/12/2006 9/2/2005 Lost 9/12/2005 E002 C002 3/12/2006 9/3/2005 Returned 9/12/2005 ISSUE OF TEMPORARY PHOTO PASS FOR EXTERNALS APPLICATION MASTER app_index name date_birth designation emp\inst 20060001 Pooja Verma 1/12/1981 Programmer Mict 20060002 Deepak 1/12/1982 Student Trainee IGNOU 2006003 Jai 2/12/1981 Programmer MICT CURRENT TEMP PASS app_index card_srno date_issue valid_upto mes/a block 20060001 C001 1/12/2006 12/31/2006 NO 20060002 C002 1/12/2006 1/12/2006 YES 20060003 C003 1/13/2006 2/12/2006 NO OLD TEMP PASS FILE app_index card_srno Date_issue valid_upto mes\ a block 20060001 C001 1/12/2005 12/31/2006 NO 20060002 C002 1/12/2006 1/12/2006 YES 20060003 C003 1/13/2006 2/12/2006 NO TEMP APPLICATION FILE app_index req_mes/a block reason_issue print_status 20060001 NO Trainee Printed 20060002 YES S/W Supports Printed 20060003 NO S/W Supports Printed LAPTOP IN/OUT MONITORING EMPLOYEE MASTER emp_code emp_name designation state_posting E001 Neeraj Sharma Programmer Pune E002 Tina Singh Tech.Director Delhi E003 Jyoti Sharma Software Eng. New Delhi NIC LAPTOP auto_index laptop_no in_date in_time out_date out_time 1 L001 2/14/2006 6:15:35 AM 2/14/2006 6:15:50 AM 2 L002 10/9/2005 10:00:00 AM 10/9/2005 11:30:00 AM 3 L003 10/13/2005 10:15:00 AM 10/13/2005 4:30:00 AM PERSON DETAIL FILE person_index name designation organization 1 Neeraj Sharma Programmer NIIT 2 Tina Singh Tech.Director MICT 3 Jyoti Sharma Software Eng. IGNOU EXTERNALS FILE person_index person_sr laptop_no in_date in_time out_date out_time accessories gatepass_no 1 P001 L001 2/14/2006 6:16:20 2/14/2006 6:16:36 Nil Null AM AM 2 P002 L002 10/9/2005 10:00:00 10/9/2005 11:30:00 Nil Nil AM AM 3 P003 L003 10/28/2005 10:15:00 10/28/2005 4:30:00 Nil G001 AM AM TELEPHONE DIRECTORY OF NIC EMPLOYEES EMPLOYEE MASTER emp_code emp_name designation state_posting E001 Deepak Tech.Director Delhi E002 Rahul Programmer Delhi E003 Deepak Tech.Director Rajastan E004 Jai fhg gfd EMPLOYEE ADDRESS emp_code office_add resi_add city E001 C.P C-12,Y.V New Delhi E002 N.P B-2\10 Y.V New Delhi E003 G.P C-89 Jaipur E004 CGFD DFD SFDS emp_phone emp_code Office_phoneno resi_phone E001 543535353 24324242 E002 522424242 42423425 E003 546767676 87767676 E004 632765675 43454564 ISSUE OF CAR STICKERS EMPLOYEE MASTER emp_code emp_name designation state_of_posting 101 Rubina Trainee CGO complex,New delhi 102 kareem programer CGO complex,New delhi 103 Parul Asst Programer CGO complex,New delhi 104 Preeti programer CGO complex,New delhi GOVT VEHICLE APPLIACTION emp_code emp_department veh_regno veh_type 101 Security Dep. VH01 Car 102 Tarining Dep VH02 Bike 103 Security Dep. VH03 Bike GOVT VEHICLE ISSUE emp_code Veh_reg_no veh_type sticker_no Valid_upto Status 101 VH01 Car SS01 12/31/2006 Issued 102 VH02 Bike SS02 12/31/2006 Issued 103 VH03 Bike SS03 12/31/2006 Issued STICKER APPLICATIONF FILE veh_reg rel_with date_of_ emp_code veh_type owner status _no _owner app 101 VH01 Car Rubina Self 2/7/2006 102 VH02 Motor/Cycle kareem Self 2/7/2006 103 VH03 Motor/Cycle DEEPAK Brother 2/7/2006 104 VH04 Motor/Cycle pooja Sister 2/7/2006 STICKER FILE stick date emp_c veh_re veh_ty rel_with date_rec valid_ owner er_n _of_i status ode g_no pe _owner _cisf upto o ssue 101 VH01 Car Rubina SN0 Self 2/7/2006 2/7/2 12/31/ Ready 1 006 2006 102 VH02 Motor/ karee SN0 Self 2/7/2006 2/7/2 12/31/ Ready Cycle m 2 006 2006 VEHICLE STATUS FILE emp_code veh_reg_no status validity 101 VH01 Issued 12/31/2006 102 VH02 Issued 12/31/2006 MY ROLE IN PROJECT As a trainee, I have been assigned the responsibility of computerization of the part of Automation of Security Related Activities, which has been discussed in this project report. The various tasks related to modules completed during the project period are: Forms Design Database Design Development of modules for data processing Testing & Debugging Implementation BIBLIOGRAPHY Mastering Visual Basic 6.0 by Evangelos Petroutsos. Visual Basic Programming Black Book by Steven Holzner. Complete reference Visual Basic. Visual Basic 6.0 from ground up by Gray Cornell. Crystal Report 7.0 the complete reference by Peck, George.